Sequence Number-Based MAC Address Spoof Detection
نویسندگان
چکیده
The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting linklayer protocol vulnerabilities require a different set of intrusion detection mechanism. Most link-layer attacks in WLANs are denial of service attacks and work by spoofing either access points (APs) or wireless stations. Spoofing is possible because the IEEE 802.11 standard does not provide per-frame source authentication, but can be effectively prevented if a proper authentication is added into the standard. Unfortunately, it is unlikely that commercial WLANs will support link-layer source authentication that covers both management and control frames in the near future. Even if it is available in next-generation WLANs equipments, it cannot protect the large installed base of legacy WLAN devices. This paper proposes an algorithm to detect spoofing by leveraging the sequence number field in the link-layer header of IEEE 802.11 frames, and demonstrates how it can detect various spoofing without modifying the APs or wireless stations. The false positive rate of the proposed algorithm is zero, and the false negative rate is close to zero. In the worst case, the proposed algorithm can detect a spoofing activity, even though it can only detect some but not all spoofed frames.
منابع مشابه
Spoofing Attack Detection and Localization in Wireless Sensor Network: a Review
--Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofers and localization of the same is a challenging task in wireless sensor network. This paper presents expository survey of various spoofing attack det...
متن کاملLightweight MAC-spoof detection exploiting received signal power and median filtering
IEEE 802.11 networks are subject to MAC-spoof attacks. An attacker can easily steal the identity of a legitimate station, even Access Points, thus enabling him to take full control over network basic mechanisms or even access restricted resources. In this paper we propose a method to detect this kind of attack based on signal power monitoring. The main contribution of our work is the introducti...
متن کاملSpoofing Detection Methods in Wireless LAN (WLAN) - A Study with pros and cons
Spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. the attacks by way of changing its network identifiers in WLANs. In such a scenario, spoof detection methods have gain wide attention. One way to prevent from spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management...
متن کاملMEDIUM ACCESS CONTROL SPOOF DETECTION AND PREVENTION ALGORITHM (MAC SDP DoS) FOR SPOOFING ATTACKS IN WLAN
Wireless Local Area Network (WLAN) is widely used today because of its mobility and ease of deployment. Providing complete security to the WLAN users is a challenge due to the open nature and undefined boundaries of the wireless networks. This paper is intended to protect the 802.11 WLAN environments from Medium Access Control (MAC) layer Denial of Service (DoS) attacks especially, the deauthen...
متن کاملA New MAC Address Spoofing Detection Technique Based on Random Forests
Media access control (MAC) addresses in wireless networks can be trivially spoofed using off-the-shelf devices. The aim of this research is to detect MAC address spoofing in wireless networks using a hard-to-spoof measurement that is correlated to the location of the wireless device, namely the received signal strength (RSS). We developed a passive solution that does not require modification fo...
متن کامل